Application Configuration Access Protocol Praveen S Thangavelu Nov-12-2003 Advisor: Dr Chung-E-Wang Department of Computer Science, CSUS.

Slides:



Advertisements
Similar presentations
Yunling Wang VoIP Security COMS 4995 Nov 24, 2008 XCAP The Extensible Markup Language (XML) Configuration Access Protocol (XCAP)
Advertisements

Module 5: Configuring Access to Internal Resources.
Introduction to push technology © 2009 Research In Motion Limited.
CPSC 441: FTP & SMTP1 Application Layer: FTP & Instructor: Carey Williamson Office: ICT Class.
Chapter 2: Application layer  2.1 Web and HTTP  2.2 FTP 2-1 Lecture 5 Application Layer.
Simple Mail Transfer Protocol (SMTP) CS-328 Dick Steflik.
Chapter 2: Application layer  2.1 Web, HTTP and HTML (We will continue…)  2.2 FTP  2.3 SMTP 9/22/2009 Lecture 7, MAT 279, Fall
3.1 © 2004 Pearson Education, Inc. Exam Managing and Maintaining a Microsoft® Windows® Server 2003 Environment Lesson 3: Introducing Active Directory.
Introduction 1 Lecture 7 Application Layer (FTP, ) slides are modified from J. Kurose & K. Ross University of Nevada – Reno Computer Science & Engineering.
1 Enabling Secure Internet Access with ISA Server.
FTP File Transfer Protocol. Introduction transfer file to/from remote host client/server model  client: side that initiates transfer (either to/from.
(ITI310) SESSIONS : Active Directory By Eng. BASSEM ALSAID.
BZUPAGES.COM An Introduction to. BZUPAGES.COM Introduction Large corporations today face the following problems Finding a certain file. Seeing everything.
1 Application Layer Lecture 5 Imran Ahmed University of Management & Technology.
Data Communications and Computer Networks Chapter 2 CS 3830 Lecture 9
1 Computer Communication & Networks Lecture 27 Application Layer: Electronic mail and FTP Waleed.
Internet-Based Client Access
Hands-On Microsoft Windows Server 2008 Chapter 1 Introduction to Windows Server 2008.
An Analysis of IMAP Security CMPE 209 Presented By Divya Panchal Bepsy Paul Menachery.
Directory Services at UMass  Directory Services Overview  Some common definitions  What can a directory do or not do?  User Needs Assessment  What.
Rensselaer Polytechnic Institute Shivkumar Kalvanaraman, Biplab Sikdar 1 The Web: the http protocol http: hypertext transfer protocol Web’s application.
Tutorial 1: Getting Started with Adobe Dreamweaver CS4.
LIGHT WEIGHT DIRECTORY ACCESS PROTOCOL Presented by Chaithra H.T.
Active Directory Windows2003 Server. Agenda What is Active Directory What is Active Directory Building an Active Directory Building an Active Directory.
File Transfer Protocol (FTP)
RELATIONAL FAULT TOLERANT INTERFACE TO HETEROGENEOUS DISTRIBUTED DATABASES Prof. Osama Abulnaja Afraa Khalifah
05/19/2003 Christiane Schmidt 1 IMAP internet message access protocol.
_______________________________________________________________________________________________________________ E-Commerce: Fundamentals and Applications1.
Implementing LDAP Client/Server System for Directory Service By Maochun Sun Project Advisor: Dr. Chung-E Wang Department of Computer Science California.
1 CS 502: Computing Methods for Digital Libraries Lecture 19 Interoperability Z39.50.
Data Communications and Computer Networks Chapter 2 CS 3830 Lecture 8 Omar Meqdadi Department of Computer Science and Software Engineering University of.
Computer Networking From LANs to WANs: Hardware, Software, and Security Chapter 13 FTP and Telnet.
Communicating Security Assertions over the GridFTP Control Channel Rajkumar Kettimuthu 1,2, Liu Wantao 3,4, Frank Siebenlist 1,2 and Ian Foster 1,2,3 1.
VoN September ‘98 1 9/17/98 VoN Standards Update Jonathan Rosenberg Bell Laboratories September 17, 1998.
Data Manipulation Jonathan Rosenberg dynamicsoft.
CS 3830 Day 9 Introduction 1-1. Announcements r Quiz #2 this Friday r Demo prog1 and prog2 together starting this Wednesday 2: Application Layer 2.
Module 3: Configuring Mailbox Server Roles. Overview Overview of Exchange Server 2007 Administration Tools Implementing Mailbox Server Roles Managing.
Improving SLP Efficiency and Extendability by Using Global Attributes and Preference Filters Weibin Zhao Henning Schulzrinne
SIMULATION OF MULTIPROCESSOR SYSTEM AND NETWORK Manish Patel Nov 8 th 2004 Advisor: Dr. Chung-E-Wang Department of Computer Science California State University,
1 Chapter 13: RADIUS in Remote Access Designs Designs That Include RADIUS Essential RADIUS Design Concepts Data Protection in RADIUS Designs RADIUS Design.
Post Office Protocol.
Slides based on Carey Williamson’s: FTP & SMTP1 File Transfer Protocol (FTP) r FTP client contacts FTP server at port 21, specifying TCP as transport protocol.
Active Directory. Computers in organizations Computers are linked together for communication and sharing of resources There is always a need to administer.
File Transfer And Access (FTP, TFTP, NFS). Remote File Access, Transfer and Storage Networks For different goals variety of approaches to remote file.
Application Design Document Developers: o Uri Goldenberg o Henry Abravanel o Academic.
Active Directory Domain Services (AD DS). Identity and Access (IDA) – An IDA infrastructure should: Store information about users, groups, computers and.
Planning an Active Directory Deployment Lesson 1.
درس مهندسی اینترنت – مهدی عمادی مهندسی اینترنت برنامه‌نویسی در اینترنت 1 SMTP, FTP.
Introduction  Model contains different kinds of elements (such as hosts, databases, web servers, applications, etc)  Relations between these elements.
Virtual Private Network Access for Remote Networks
Dibyajit Computer Security Hacking dibyajit
Jonathan Rosenberg dynamicsoft
Remote Logging, Electronic Mail, and File Transfer
The Client-Server Model
Federation Systems, ADFS, & Shibboleth 2.0
Data Communications and Computer Networks Chapter 2 CS 3830 Lecture 9
Chapter 2: System Structures
Hypertext Transport Protocol
Real Life Networking Examples
(ITI310) SESSIONS 6-7-8: Active Directory.
Creating Novell Portal Services Gadgets: An Architectural Overview
Understand Networking Services
Implementing TMG Server Publishing
Notification Service May 19, 2006 Jon Atherton Mark Mara.
Chapter 2 Introduction Application Requirements VS. Transport Services
WEB API.
ASP.NET Module Subtitle.
Chapter 17: Client/Server Computing
Windows API: Network Policy Server Extensions
Distributed Systems Bina Ramamurthy 4/22/2019 B.Ramamurthy.
Presentation transcript:

Application Configuration Access Protocol Praveen S Thangavelu Nov Advisor: Dr Chung-E-Wang Department of Computer Science, CSUS

Motivation and Agenda  Opportunity to study, design and implement a real life internet protocol  Solution to client mobility  Understanding RFC specifications  Agenda Overview Protocol Framework ACAP Commands Design Issues – Methodology, scope & clients Major functionality Problems Results and Future enhancements

Overview  Companion protocol to IMAP  IMAP vs. ACAP  History – IMSP and ACAP  Directory Service??  Application of ACAP and Example  ACAP Usage for Mobile User  Example Clients EUDORA – ACAP enabled

Data Model and Design Goals  ACAP Data Model Datasets, entries and attributes Tree of entries Rules with which clients access datasets are specified in dataset classes Pre-defined attributes  Design Goals Access Configuration/Preferences remotely Emphasis on client simplicity Easily manageable – Dataset Inheritance Clients with intermittent access- slow clients – modtime attribute Operated well with Large clients

Protocol Framework  Link Level Assumes reliable data stream (TCP/Port 674)  Client Server connection Text based line oriented protocol  Commands and responses Client command Server data Server completion results  Tagged response; command continuation request  Operational Considerations Data transferred comply with underlying transport window size Multiple commands

Server States  Connection ACAP greeting  Rejected Connection Bye Greeting  Successful Authenticate  Logout Logout command Server shutdown Connection closed Init Connection/Server greeting Non-authenticated Authenticated Logout and close connection

Protocol Elements  Datasets Entries, attributes  Response code OK, BAD, NO  Access Control Lists  Namespaces  Functionality Communication Dataset definition Parsing system

Implementation Issues  Communication Subsystem  Multiple clients  In memory representation of data  ACAP Command Parsing  Some Server Response codes – Modified  Datasets CREATE, READ, STORE  Compatibility with real time mail clients Other mail clients – pine

Some Sample Results  Client:  Server: * ACAP (IMPLEMENTATION "Plugged In ACAP Server v1.03") (CONTEXTLIMIT "150") (SASL "CRAM-MD5" "KERBEROS_V4")  Client: GH45 STORE ("/addressbook/user/praveen"  "Contact.Name" "Praveen" "Contact. "   Server: GH45 OK "STORE completed"  Client: GH46 LOGOUT  Server: * BYE "See ya later"  Server: GH46 OK "LOGOUT completed“  Planning to store configuration Information for Pine or ELM

Future Enhancements  Server Replication/ Mirroring  Extending per user data to group of users  Scope Extension Complex Search Queries Authorization using ACL Include contexts per session  Extension to Web based clients like squirrel mail